1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
2 years ago
9

Create a python program that will input their name and their age. It will show an output "Hi, {name} ! How are you? I know you a

re {age} old."
I WILL MARK YOU AS BRAINLIEST​
Computers and Technology
1 answer:
lianna [129]2 years ago
4 0

Answer:

age = 10

name = Cynthia

make an f string so the variables appear in the string. There are other ways to do this but I prefer f strings instead of using string concatenation. It causes problems adding 2 strings together most of the time.

print(f'Hi, {name} ! How are you? I know you are {age} old.')

You might be interested in
which program monitors the computer by looking for known trouble makers as well as suspicious behavior​
lys-0071 [83]

Answer:

i think spyware because spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with a user's control of a computer by installing additional software or redirecting web browsers.

Explanation:

3 0
3 years ago
What is performance? Multiple Choice measures how quickly a system performs a process or transaction a system that is not operat
Lilit [14]

Answer: measures how quickly a system performs a process or transaction

Explanation:

Computer performance refers to how well a given computer system performs, which is estimated by its accuracy, efficiency and speed when completing a process or transaction.

A computer performance evaluation will assess a system's resources and outputs to make sure that it´s performing in the best possible way.

Some parameters of performance are latency, speed, throughput, and bandwidth.

8 0
3 years ago
Read 2 more answers
Two parter:
sashaice [31]

Answer:

This is an infinite loop.

Explanation:

The while loop while never end since the last statement inside the while loop will continue to decrement the value of num by 1 and the condition num < 9 will always be true.

So either change the condition of the while loop like: num > -9

or start incrementing the variable num in the last statement of the while loop like:

num = num + 1

Note: Don't make both changes at the same time.

Visit: gotit-pro.com for fastest, top-notch and impeccable homework and exams help in a range of subjects and ace your academics.

Thanks and Best Regards: Your Friendly Study Co-Pilot

6 0
3 years ago
Which element is included in the shot breakdown storyboard? Which element is included in the shot breakdown storyboard?
VladimirAG [237]

Answer: jump out

Explanation:

Took the test and it was correct

5 0
3 years ago
A computer supply company is located in a building with three wireless networks.
Sonja [21]

Answer:

A. Rogue access point

Explanation:

A rogue access point is defined as a wireless access point installed on a secure network infrastructure without consent of the owner of the network or without due authorization. While this can sometimes be added by a malicious attacker, it is most commonly set up by employees with the desire to have wireless access even when there is any available.

In the question, there are three wireless networks, but on scanning, five wireless networks were found, hence they are rogue access point.

3 0
3 years ago
Other questions:
  • 1. Perform the following Binary Additions 101101 + 10100 *
    13·2 answers
  • Mary is troubleshooting her company's LAN network. She finds out that data segments that the client is encoding are resulting in
    9·1 answer
  • An email message form includes all of the following main areas except
    11·2 answers
  • You want to drive traffic to a new landing page for a campaign, and want a web address that's short, easy to remember, trackable
    7·1 answer
  • In your own words, describe what Internet Protocols are. Why is it important to have agreed upon protocols?
    6·1 answer
  • The _ are the devices that allow a computer system to communicate and interact with the outside world as well as store informati
    11·1 answer
  • Because it takes time to change an organization’s culture, the ISO must continually monitor security policy compliance. The ISO
    9·1 answer
  • What should a password policy contain to reduce a hackers ability to crack the passwords?
    10·1 answer
  • Translate We get up at 8 o'clock into Spanish in the box below:​
    9·1 answer
  • Help a brotha out..................
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!